The listed exploits originate mostly from old Microsoft Vista OS, and their mitigations are now built in to Windows and can be enabled using GPO.
Additional Information
The CB Protection Agent will block any unapproved file that tries to execute if the Agent is on at least Medium enforcement.
It's important to emphasize that with modern operating systems, exploit mitigation is built in and the risk of allowing arbitrary files to execute on your machines without approval far exceeds that of getting exploited by an adversary with one of the mentioned techniques.
The threats listed are specific to anti-exploit mitigation techniques introduced in Windows Vista. These are typically enforced per application with something like Microsoft Windows Exploit Guard. For instance, by default in Windows 10, all of the Office applications, Edge, and a handful of OS binaries are protected with the aforementioned anti-exploit techniques.
A number of these techniques are part of application exploits in MSF. But with all code execution exploits you MUST have very specific application version requirements